|
Message-ID: <e2f9ffaf0d16ba710336920d0c753914@smtp.hushmail.com> Date: Fri, 15 Feb 2013 15:06:05 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: netntlm bitsliced conversion On 15 Feb, 2013, at 14:23 , magnum <john.magnum@...hmail.com> wrote: > OTOH you could have a look at binary() in the "exploit" formats. That's where we brute-force the 2^16 possible block 3 DES keys from the NT hash. Maybe that could be done with BS? It would speed up loading a lot, but not actual cracking. Here's that loop: for (i = 0; i < 0x100; i++) for (j = 0; j < 0x100; j++) { key[0] = i; key[1] = j; setup_des_key(key, &ks); DES_ecb_encrypt(challenge, &b3cmp, &ks, DES_ENCRYPT); if (!memcmp(&binary[2 + 8 * 2], &b3cmp, 8)) { binary[0] = i; binary[1] = j; goto out; } } With BS I suppose we could do this many at a time. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.